Bug#600384: dm-crypt: please backport support for plain64 IV

2010-10-16 Thread Henrique de Moraes Holschuh
Package: linux-2.6
Version: 2.6.32-25
Severity: important

Please backport commit 61afef614b013ee1b767cdd10325acae1db1f4d2
dm crypt: add plain64 iv from upstream.  It should be a clean
cherry-pick.

Without it, Debian squeeze users might not be able to use dm-crypt
volumes created on newer kernels using *-xts-plain64, nor will be able
to create such volumes.

Using plain for IVs on block devices with more than 2^32 blocks will
cause the same IV to be used twice due to roll-over.  This is not a good
thing, although it might be not bad enough to matter much (or it could
be a terrible problem.  Someone who groks crypto for real would have to
answer that).

One cannot fix the plain IV to not warp at 2^32, or data after the
roll-over point becomes unreadable on any already-existing devices.
Thus, the only solution was to add a new IV (plain64).  For devices
smaller than 2^32 512 byte blocks, plain and plain64 are equivalent.

Userspace and docs are already beggining to tell users to use
aes-xts-plain64 and not aes-xts-plain.  They will use them in their
portable HDs, possibly on other distros, and then will not be able to
read them back in squeeze.

-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32.23 (SMP w/8 CPU cores)
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20101016165729.32565.38223.report...@khazad-dum2.khazad-dum.debian.net



Bug#600384: dm-crypt: please backport support for plain64 IV

2010-10-16 Thread Ben Hutchings
On Sat, 2010-10-16 at 13:57 -0300, Henrique de Moraes Holschuh wrote:
 Package: linux-2.6
 Version: 2.6.32-25
 Severity: important
 
 Please backport commit 61afef614b013ee1b767cdd10325acae1db1f4d2
 dm crypt: add plain64 iv from upstream.  It should be a clean
 cherry-pick.
 
 Without it, Debian squeeze users might not be able to use dm-crypt
 volumes created on newer kernels using *-xts-plain64, nor will be able
 to create such volumes.
 
 Using plain for IVs on block devices with more than 2^32 blocks will
 cause the same IV to be used twice due to roll-over.  This is not a good
 thing, although it might be not bad enough to matter much (or it could
 be a terrible problem.  Someone who groks crypto for real would have to
 answer that).
[...]

The original author explains in
https://partner-bugzilla.redhat.com/show_bug.cgi?id=600295: the plain
IV restarts and opens device to watermarking attack (two sectors shares
the same IV, you can manipulate with the second if you know content of
the first).

This seems to justify an update on the grounds of security, not to
mention compatiblity.

Ben.

-- 
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.


signature.asc
Description: This is a digitally signed message part